A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
A unified approach to identifying and healing vulnerabilities in x86 machine code
2012
Proceedings of the 18th annual international conference on Mobile computing and networking - Mobicom '12
The security of software systems is threatened by a wide range of attack vectors, such as buffer overflows, insecure information flow, and side channels, which can leak private information, e.g., by monitoring a program's execution time. Even if programmers manage to avoid such vulnerabilities in a program's source code or bytecode, new vulnerabilities can arise as compilers generate machine code from those representations. We propose a virtual execution environment for x86 machine code that
doi:10.1145/2348543.2348593
dblp:conf/mobicom/Kononenko12
fatcat:ekd5eyzkl5aorcfzpezgmyjayq